Browsing Category
Tutorials
94 posts
Cyber Monday Sale- Complete Ethical Hacking Course Bundle
The Complete Ethical Hacking Course Bundle Enroll for $50 only- 90% off price Become an ethical hacker that…
November 30, 2020
How To Capture PCAP Logs With Wireshark
Today, we are working about capturing the PACP LOGS with the help of Wireshark. Organization following logs are…
October 22, 2020
Metasploit Tutorial – How To Write Auxiliary Module?
Metasploit Tutorial Auxiliary module Metasploit is known for its free, open-source exploits – modules that pop shells. But…
July 30, 2020
RecoX: Scripts For Web Application Reconnaissance
RecoX, an open source software a collection of master scripts for Web Application Scanning. The script aims to…
June 12, 2020
Turbinia – Automation And Scaling of Digital Forensics
Turbinia is an open-source framework for deploying, managing, and running distributed forensic workloads. It is intended to automate…
May 20, 2020
HOCXSS Automatic Cross Site Scripting XSS Vulnerability Scanner
Today, we are presenting our own Intelligence HOCXSS Automatic (Cross Site Scripting) vulnerability scanner along with the complete…
May 6, 2020
Android Root Detection Bypass – Tutorial
Root detection bypass by Objection and Frida Tutorial by Sakshi Sharma, a Cyber Security consultant. What is Root…
May 4, 2020
Google Bug Bounty $3133 Writeup XSS Vulnerability
$3133.7 Google Bug Bounty Writeup XSS Vulnerability. The vulnerability was found by Pethuraj, he is a security researcher…
April 1, 2020
SQL Injection Cheatsheet 2021
SQL Injection Cheatsheet is the great source to find the vulnerabilities and help to protect your website. SQL…
February 19, 2020
GDA- Android Reverse Engineering Suite
GDA (GJoy Dex Analyzer) – Android Reverse Engineering Suite Android Malware Static Analysis File loading and decompiling Variable…
February 7, 2020